首页> 外文期刊>Computers & Security >Further analysis of password authentication schemes based on authentication tests
【24h】

Further analysis of password authentication schemes based on authentication tests

机译:基于身份验证测试的密码身份验证方案的进一步分析

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we present further analysis of Yang-Shieh's password authentication schemes. At first, we formally analyze Yang-Shieh's two password authentication schemes on the basis of authentication tests to disclose the insecurity of the two schemes, and then give two kind of examples, one is our attack to the nonce-based scheme and the other is Chan-Cheng's attack (Comput Secur 21 (2002) 74) and Fan-Li-Zhu's attack (Comput Secur 21 (2002) 665) to the timestamp-based scheme. Secondly, we propose an amendment of the timestamp-based scheme to withstand the attacks of Chan-Cheng and Fan-Li-Zhu, and propose our improved nonce-based scheme. Finally, we formally analyze our two improved schemes with the authentication tests, and prove they are secure in password authentication. Our improved schemes preserve the merits of Yang Shieh's schemes, and the improved timestamp-based scheme can withstand the attacks of Chan-Cheng and Fan-Li-Zhu, and the improved nonce-based scheme is able to prevent malicious replay attacks in the network without synchronized clock or with long transmission delay. (C) 2004 Elsevier Ltd. All rights reserved.
机译:在本文中,我们将对Yang-Shieh的密码身份验证方案进行进一步分析。首先,我们在身份验证测试的基础上正式分析了Yang-Shieh的两个密码身份验证方案,以揭示这两种方案的不安全性,然后给出两种示例,一种是我们对基于随机数的方案的攻击,另一种是我们对基于随机数的方案的攻击。针对基于时间戳的方案,Chan-Cheng的攻击(Comput Secur 21(2002)74)和Fan-Li-Zhu的攻击(Comput Secur 21(2002)665)。其次,我们提出了对基于时间戳的方案的修正,以抵御Chan-Cheng和Fan-Li-Zhu的攻击,并提出了改进的基于nonce的方案。最后,我们通过身份验证测试正式分析了我们的两种改进方案,并证明它们在密码身份验证中是安全的。我们改进的方案保留了杨锡方案的优点,改进的基于时间戳的方案可以承受Chan-Cheng和Fan-Li-Zhu的攻击,改进的基于nonce的方案可以防止网络中的恶意重播攻击没有同步时钟或传输延迟长。 (C)2004 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号